CFP last date
20 March 2024
Call for Paper
April Edition
IJCA solicits high quality original research papers for the upcoming April edition of the journal. The last date of research paper submission is 20 March 2024

Submit your paper
Know more
Reseach Article

Survey of Threats to the Biometric Authentication Systems and Solutions

by Sarika Khandelwal, P. C. Gupta, Khushboo Mantri
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 61 - Number 17
Year of Publication: 2013
Authors: Sarika Khandelwal, P. C. Gupta, Khushboo Mantri
10.5120/10024-5020

Sarika Khandelwal, P. C. Gupta, Khushboo Mantri . Survey of Threats to the Biometric Authentication Systems and Solutions. International Journal of Computer Applications. 61, 17 ( January 2013), 39-43. DOI=10.5120/10024-5020

@article{ 10.5120/10024-5020,
author = { Sarika Khandelwal, P. C. Gupta, Khushboo Mantri },
title = { Survey of Threats to the Biometric Authentication Systems and Solutions },
journal = { International Journal of Computer Applications },
issue_date = { January 2013 },
volume = { 61 },
number = { 17 },
month = { January },
year = { 2013 },
issn = { 0975-8887 },
pages = { 39-43 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume61/number17/10024-5020/ },
doi = { 10.5120/10024-5020 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:09:44.257972+05:30
%A Sarika Khandelwal
%A P. C. Gupta
%A Khushboo Mantri
%T Survey of Threats to the Biometric Authentication Systems and Solutions
%J International Journal of Computer Applications
%@ 0975-8887
%V 61
%N 17
%P 39-43
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Biometric authentication is an exciting field in the system security domain. The challenges associated with this domain need to be addressed in detail since the security of the biometric template is itself a big challenge. Biometric template once lost or copied cannot be changed like simple password. This paper summarizes and discusses major challenges; Categorization of the attacks and their known remedies has also been highlighted. This work is an attempt to establish a thought in front of research community that the methods proposed recently do not sufficiently encompasses the concrete security procedures to make the biometric template safe.

References
  1. K. Mitnick, W. Simon, and S. Wozniak, The Art of Deception: Controlling the Human Element of Security. Wiley, 2002.
  2. KarthikNandakumar,Anil K. Jain, Sharath Pankanti,"Fingerprint-based Fuzzy Vault: Implementation and Performance", IEEE Transactions on Information Forensics And Security, December 2007
  3. Anil K. Jain, Karthik Nandakumar, and Abhishek Nagar," Review Article Biometric Template Security", EURASIP Journal on Advances in Signal Processing Volume 2008, Article ID 579416, 17 pages doi:10. 1155/2008/579416.
  4. A. B. J. Teoh, A. Goh, and D. C. L. Ngo, "Random multispace quantization as an analytic mechanism for BioHashing of biometric and random identity inputs," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 28, no. 12, pp. 1892–1901, 2006.
  5. P. N. Belhumeur, J. P. Hespanha, and D. J. Kriegman, "Eigenfacesversusfisherfaces: recognition using class specific linear projection," IEEE Transactions on Pattern Analysis and MachineIntelligence, vol. 9, no. 7, pp. 711–720, 1997.
  6. N. K. Ratha, S. Chikkerur, J. H. Connell, and R. M. Bolle,"Generating Cancelable Fingerprint Templates," IEEE Transactionson Pattern Analysis and Machine Intelligence, vol. 29,no. 4, pp. 561–572, April 2007.
  7. A. Juels and M. Sudan, "A Fuzzy Vault Scheme", Proceedings of IEEE International Symposium on Information Theory, vol. 6, no. 3, pp. 408,2002.
  8. V. Evelyn Brindha "Biometric Template Security using Fuzzy Vault" 2011 IEEE 15th International Symposium on Consumer Electronics
  9. T. Clancy, et al. , "Secure Smartcard-based Fingerprint Authentication," in Proc. of ACM SIGMM Multim. , Biom. Met. & App. , pp. 45-52, 2003. Article (CrossRef Link)
  10. U. Uludag, et al. , "Fuzzy Vault for Fingerprints," in Proc. of Audio- and Video-based Biometric Person Authentication, pp. 310-319, 2005. Article (CrossRef Link)
  11. K. Nandakumar, et al. , "Fingerprint-based Fuzzy Vault: Implementation and Performance," IEEE Transactions on Information Forensics and Security, vol. 2, no. 4, pp. 744-757, 2007. Article (CrossRef Link)
  12. S. Yang and I. Verbauwhede, "Automatic Secure Fingerprint Verification System Based on Fuzzy Vault Scheme," in Proc. of IEEE International Conference on Acoustics, Speech, and Signal Processing, Vol. 5, pp. 609-612, 2005. Article (CrossRef Link)
  13. Y. Chung, et al. , "Automatic Alignment of Fingerprint Features for Fuzzy Fingerprint Vault," LNCS 3822, pp. 358-369, 2005. Article (CrossRef Link)
  14. D. Moon, et al. , "Fingerprint Template Protection Using Fuzzy Vault," LNCS 4707, pp. 1141-1151, 2007. Article (CrossRef Link)
  15. D. Moon, et al. , "Configurable Fuzzy Fingerprint Vault for Match-on-Card System," IEICE Electron Express, vol. 6, no. 14, pp. 993-999, 2009. Article (CrossRef Link)
  16. P. Zhang, J. Hu, C. Li, M. Bennamound, and V. Bhagavatulae, "A Pitfall in Fingerprint Bio-Cryptographic Key Generation," Computers and Security, Elsevier, 2011. Article (CrossRef Link)
  17. H. Wolfson and I. Rigoutsos, "Geometric Hashing: an Overview," IEEE Computational Science and Engineering, vol. 4, pp. 10-21, Oct. -Dec. 1997.
  18. S. Yang and I. Verbauwhede, "Automatic Secure Fingerprint Verification System Based on Fuzzy Vault Scheme," in Proc. of IEEE International Conference on
  19. Jin Zhe "Fingerprint Template Protection with Minutia Vicinity Decomposition" 978-1-4577-1359-0/11/$26. 00 ©2011 IEEE
  20. Sungju Lee, "A Practical Implementation of Fuzzy Fingerprint Vault" KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS VOL. 5, NO. 10, October 2011 pg. 1783-1798.
  21. Arun Ross and Asem Othman ,"MIXING FINGERPRINTS FOR TEMPLATE SECURITY AND PRIVACY" 19thEuropian Signal processing conference(EUSPICO-2011),Barcelona,spain,August-29-sept 2-2011 ISSN 2076-1465
  22. Adler, A. : Reconstruction of source images from quantized biometric match scoredata. In: Biometrics Conference, Washington, DC (September 2004)
  23. N. K. Ratha, J. H. Connell, and R. M. Bolle, "An analysis of minutiae matching strength", Proc. AVBPA 2001, Third International Conference on Audio- and Video-Based Biometric Person Authentication, pp. 223-228, 2001.
  24. S. -W. Lee and S. Z. Li (Eds. ): ICB 2007, LNCS 4642, pp. 760–769, 2007.
  25. T. Putte and J. Keuning, "Biometrical fingerprint recognition: don't get your fingers burned", Proc. IFIP TC8/WG8. 8, Fourth Working Conf. Smart Card Research and Adv. App. , pp. 289-303, 2000.
  26. T. Matsumoto, H. Matsumoto, K. Yamada, and S. Hoshino, "Impact of Artificial Gummy Fingers on Fingerprint Systems", Proc. of SPIE, Optical Security and Counterfeit Deterrence Techniques IV, vol. 4677, pp. 275-289, 2002.
  27. R. Derakhshani, S. A. C. Schuckers, L. A. Hornak, and L. O. Gorman, "Determination of vitality from a non-invasive biomedical measurement for use Acoustics, Speech, and Signal Processing, Vol. 5, pp. 609-612, 2005. Article (CrossRef Link)
Index Terms

Computer Science
Information Sciences

Keywords

Template security Biometric Fuzzy vault Biometric cryptography attacks on biometrics